Credential Stuffing Attack Technique — Automated Account Takeover Using Stolen Credentials
Technical explanation of credential stuffing, an attack technique where threat actors use previously stolen username and password combinations to gain unauthorized access to user accounts across multiple services.
Watering Hole Attack Technique — Targeted Compromise of Websites Used by Victims
Technical explanation of watering hole attacks, a technique in which threat actors compromise websites frequently visited by a target group in order to infect visitors with malware.
Drive-By Compromise — Web-Based Malware Delivery
Drive-by compromise is an attack technique where malicious code is delivered to victims simply by visiting a compromised or malicious website, often exploiting browser vulnerabilities.
Drive-By Download Attack Technique — Silent Malware Delivery Through Compromised Websites
Technical explanation of drive-by download attacks, a technique in which malware is silently delivered to victims when they visit compromised or malicious websites.
Exploit Kit Attack Technique — Automated Delivery of Exploits Through Web Infrastructure
Technical explanation of exploit kits, a technique used by threat actors to automatically exploit vulnerabilities in visiting systems and deliver malware payloads through compromised web infrastructure.
Browser Exploitation — Web-Based Attack Techniques
Browser exploitation refers to attacks that target vulnerabilities in web browsers, plugins, or browser components to execute malicious code, steal credentials, or deliver malware to victims.
Living-off-the-Land Attack Technique — Abuse of Legitimate System Tools for Malicious Operations
Technical explanation of the Living-off-the-Land attack technique, where threat actors use legitimate system tools and utilities to conduct malicious operations while avoiding detection.
User Execution — Attacks Requiring User Interaction
User execution is an attack technique where malicious actions occur after a victim opens a file, runs a program, or clicks a link that triggers malware execution.
Remote Access Abuse — Exploiting Remote Access Tools
Remote access abuse refers to attackers exploiting legitimate remote access services such as RDP, VPN, or remote administration tools to gain and maintain unauthorized system access.
Credential Harvesting Attack Technique — Theft of Authentication Credentials
Technical explanation of credential harvesting, an attack technique used by threat actors to steal authentication credentials and gain unauthorized access to systems and networks.
Lateral Movement Attack Technique — Expanding Access Within Compromised Networks
Technical explanation of lateral movement, an attack technique used by threat actors to expand access across enterprise networks after initial compromise.
Domain Hijacking Attack Technique — Unauthorized Control of Registered Internet Domains
Technical explanation of domain hijacking, an attack technique in which threat actors obtain unauthorized control over registered domain names in order to redirect traffic, conduct phishing campaigns, or distribute malware.
Privilege Escalation Attack Technique — Gaining Elevated Access in Compromised Systems
Technical explanation of privilege escalation, an attack technique used by threat actors to obtain higher levels of access within compromised systems and enterprise networks.
Credential Dumping Attack Technique — Extracting Authentication Data from Compromised Systems
Technical explanation of credential dumping, an attack technique used by threat actors to extract stored authentication credentials from compromised systems in order to escalate privileges and move laterally within enterprise networks.
DNS Poisoning Attack Technique — Manipulating Domain Name Resolution to Redirect Victims
Technical explanation of DNS poisoning attacks, a technique in which attackers manipulate DNS responses in order to redirect users to malicious infrastructure without their knowledge.
Phishing Attack Technique — Credential Theft and Initial Access Method
Technical explanation of phishing, a social engineering attack technique used to trick users into revealing credentials or executing malicious content.
Data Exfiltration Attack Technique — Unauthorized Transfer of Sensitive Information
Technical explanation of data exfiltration, an attack technique used by threat actors to transfer sensitive information from compromised systems to external infrastructure under attacker control.
Session Hijacking Attack Technique — Unauthorized Takeover of Active User Sessions
Technical explanation of session hijacking, an attack technique in which threat actors take control of active authenticated sessions to gain unauthorized access to systems and applications.
Persistence Attack Technique — Maintaining Access to Compromised Systems
Technical explanation of persistence, an attack technique used by threat actors to maintain long-term access to compromised systems and networks even after initial intrusion vectors are removed.
Command and Control (C2) Attack Technique — Remote Management of Compromised Systems
Technical explanation of command and control infrastructure, an attack technique used by threat actors to communicate with compromised systems and coordinate malicious operations.
Defense Evasion Attack Technique — Avoiding Detection by Security Systems
Technical explanation of defense evasion, an attack technique used by threat actors to bypass or disable security controls in order to remain undetected within compromised systems.
Initial Access Attack Technique — Gaining the First Foothold in Target Systems
Technical explanation of initial access techniques used by threat actors to gain the first foothold within target systems or enterprise networks.
Zero-Day Exploit Attack Technique — Exploiting Vulnerabilities Before Security Patches Exist
Technical explanation of zero-day exploits, an attack technique in which threat actors exploit previously unknown software vulnerabilities before developers release security patches.
Malware Delivery Attack Technique — Distributing Malicious Software to Target Systems
Technical explanation of malware delivery techniques used by threat actors to distribute malicious software through email, compromised websites, and other intrusion vectors.
Reconnaissance Attack Technique — Information Gathering Before and During Intrusions
Technical explanation of reconnaissance, an attack technique used by threat actors to gather information about target systems, networks, and users prior to or during cyber intrusion campaigns.
Supply Chain Attack Technique — Compromising Trusted Software or Service Providers
Technical explanation of supply chain attacks, a technique in which threat actors compromise trusted software vendors, service providers, or development pipelines in order to distribute malicious code to downstream organizations.
Man-in-the-Middle Attack Technique — Intercepting and Manipulating Network Communications
Technical explanation of man-in-the-middle attacks, a technique in which attackers intercept and potentially modify communications between systems in order to steal data or manipulate interactions.
Brute Force Attack Technique — Systematic Credential Guessing to Gain Unauthorized Access
Technical explanation of brute force attacks, an authentication abuse technique in which attackers systematically attempt large numbers of password combinations to gain unauthorized access to accounts or systems.